Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Hacking the Box (Joseph Sheridan)

Hacking the Box (Joseph Sheridan)

Speaker: Joseph Sheridan (http://goo.gl/9cMJ8)
Slides by Chris Cooper and Joseph Sheridan.

Penetration tester and ethical hacker Joseph Sheridan takes you through some of the day-to-day hacks utilised during a security engagement.

Presented at #Digibury 007.
http://deeson-online.co.uk/digibury/007

Chris Cooper

July 11, 2012
Tweet

More Decks by Chris Cooper

Other Decks in Technology

Transcript

  1. penetration testing aka ethical hacking, pentesting, white hat hacking etc…

    introduction What is penetration testing? What will be covered today?
  2. penetration testing aka ethical hacking, pentesting, white hat hacking etc…

    Services • Network infrastructure • Web apps • Host build reviews • Wireless networks • Database security
  3. domain admin in under 30mins guess passwords the easy way

    in? < this actually happens password policy
  4. the easy way in? the awful passwords we find: Blank

    • SQL Server • Gary McKinnon blank root pentagon Password01 Company name Football team Swear words Their own username
  5. more easiness look for unpatched servers e.g. how about an

    internet-facing host with no firewall and missing critical security patches MS04-011 MS06-040 MS08-067 MS09-050 / LSASS / Canonicalisation / Netapi / Negotiate Function Table
  6. sharing != caring when you have found a password for…

    oh, say a local administrator account chances of another account having the same password = HIGH
  7. stale cookies e.g. once upon a time, we found the

    following session token… MDEzODM0MDg4NzM= which translates from Base64 to… 0 1 3 8 3 4 0 8 8 7 3 always zero random sequential (every login) get any active session by enumerating through 9999 values (approx 10mins in this case)
  8. SQLi Enter your username and password: Go! $query = “SELECT

    id FROM users WHERE uname=‘ ’ “ . $username . “ AND pword=‘ “ . $password . “ ’” joebloggs *********
  9. SQLi joebloggs Enter your username and password: Go! $query =

    “SELECT id FROM users WHERE uname=‘ ’ ********* joebloggs AND pword=‘ ‘ OR 1=1# ’”
  10. SQLi joebloggs Enter your username and password: Go! $query =

    “SELECT id FROM users WHERE uname=‘joebloggs’ ********* AND pword=‘‘ OR 1=1#’”
  11. phishing From: Company IT Helpdesk <[email protected]> To: Fred Jones <[email protected]>

    Subject: IT Helpdesk Important Information – Action Required Dear Fred, We have detected suspicious activity relating to your Company account. As a precaution, we require you to verify your details using the password management system. Failure to do so may result in revocation of your user rights. Please copy and paste the following URL into your browser: http://security.company.com/pm/?verify=982364925874578955 IT Dept. Company [email protected] This email and any files transmitted with it are confidential and are intended solely for the use of the individual to whom they are addressed. If you are not the intended recipient please notify the sender. Any unauthorised dissemination or copying of this email or its attachments and any use or disclosure of any information contained in them, is strictly prohibited. Please consider the environment before printing this email.
  12. phishing users were directed to a mirrored login on our

    server how many fell for it? 9 /60
  13. USB drop could be preloaded with malware or spawn outgoing

    connections leave them lying around / curiosity hand them in to receptionist / helpfulness